Jean-Noël Colin
Université de Namur
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jean-Noël Colin.
Proceedings. First IEEE International Workshop on Electronic Contracting, 2004. | 2004
James Simon; Jean-Noël Colin
In this paper, we present a model for a licensing scheme that allows the expression, negotiation and management of digital rights, in a federated object-sharing environment. We first discuss motivations and issues around digital rights management (DRM), we then describe the DRM implementation for the celebrate project, and propose an extension to the celebrate model in order to take into account licenses as opposed to individual rights.
international conference on information technology new generations | 2006
Jawed I. A. Siddiqi; Babak Akhgar; Mehrdad Naderi; Wolfgang Orth; Norbert Meyer; Miika Tuisku; Gregor Pipan; Mario López Gallego; José García; Maurizio Cecchi; Jean-Noël Colin
The paper reports on the current research activities related to the delivery of a federated global identity management framework for provisioning secure ICT services; this represents a significant step towards the development of global federated security services for the Web, Grid and particularly for future Mobile and Wireless communication (ICT platforms). The overall aim of the research is to provide seamless traversal to access distributed resources in the heterogeneous Web, Grid, and particularly Mobile and Wireless spaces. Furthermore, in order to consider the value and usefulness of the Trust-ME framework its strategic impact is assessed in terms of its proposed application to a real world integrated scenarios in three distinct domains of telecommunications, surveillance and virtual gaming.
ieee international symposium on policies for distributed systems and networks | 2011
Guillaume Benats; Arosha K. Bandara; Yijun Yu; Jean-Noël Colin; Bashar Nuseibeh
The rapid growth of mobile applications has imposed new threats to privacy: users often find it challenging to ensure that their privacy policies are consistent with the requirements of a diverse range of of mobile applications that access personal information under different contexts. This problem exacerbates when applications depend on each other and therefore share permissions to access resources in ways that are opaque to an end-user. To meet the needs of representing privacy requirements and of resolving dependencies issues in privacy policies, we pro-pose an extension to the P-RBAC model for reasoning about plausible scenarios that can exploit such weaknesses of mobile systems. This work has been evaluated using the case studies on several Android mobile applications.
International Journal of Security and Networks | 2013
Annanda Thavymony Rath; Jean-Noël Colin
Enforcing the purpose of data usage means to ensure that data are used as it intends for and that excessive usage cannot happen. In general, the enforcement of purpose is a complicated task. The main difficulty is to identify the purpose of an agent when it requests to perform an action. In this paper, we discuss the design issue of usage purpose enforcement model based on our proposed enforcement structure: pre-, ongoing-, and post-enforcement. We also propose an enforcement solution for usage control designed for distributed healthcare information system, particularly, the pre-and ongoing-enforcement of purpose. Furthermore, we validate our model with a prototype developed in Java.
international conference on web based learning | 2009
Jean-Noël Colin; Tien-Dung Le; David Massart
In a large federation of commercial learning object repositories, customers might be confronted to different access control procedures put in place by different content providers to enforce their respective distribution models. This paper proposes a federated authorization service that provides a uniform access to learning objects protected by different authorization protocols. This service is based on a learning object broker that mediates different distribution models.
consumer communications and networking conference | 2013
Annanda Thavymony Rath; Jean-Noël Colin
Purpose of access is one of the core concepts in privacy which considers the data users intent as a factor in making access control decisions and enforcement of purpose is required to ensure that data is used as what it intends for. In general, the enforcement of purpose is a complicated task. The main difficulty is how to identify the purpose of an agent when it requests to perform an action. In this paper, we discuss the design issue of purpose enforcement based on our proposed (defined) enforcement structure: pre-enforcement, ongoing-enforcement, and post-enforcement. We also propose an enforcement solution for usage control designed for distributed healthcare information system, particularly, the pre-enforcement of purpose (the validation of claimed purpose at the initial state before data is granted access).
international conference on model-driven engineering and software development | 2017
Christophe Feltus; Eric Grandry; Thomas Kupper; Jean-Noël Colin
Protection of individuals with regard to the processing of personal data and the free movement of such data constitutes new challenges in terms of privacy management. Although this privacy management ought to be conducted in compliance with national and international regulation, for now we observe that no solution, model or method, fully consider and integrate these new regulations yet. Therefore, in this paper, we propose to tackle this problem through the definition of an expressive privacy metamodel which aims to represent and aggregate the concepts that are relevant to define and to deal with privacy issues, at an organizational level. Secondly, we discuss how this privacy metamodel may support and may help understanding the management of the privacy in enterprises involve in interconnected societies, by integrating the privacy metamodel with the systemic business ecosystem.
29th IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2015 | 2015
Annanda Thavymony Rath; Jean-Noël Colin
In this paper, we address the issues of personal data protection for privacy preserving perimeter protection system, particularly, the access control for real-time data streamed from surveillance tools and also for data stored in facility’s storage. Furthermore, we also provide an access control model proposed specifically for such system and access control system implemented in Java.
european conference on technology enhanced learning | 2013
Frans Andre Van Assche; Bernd Simon; Michael Aram; Jean-Noël Colin; Hoang Minh Tien; Dai Griffiths; Kris Popat; Luis E. Anido-Rifón; Manuel Caeiro-Rodríguez; Juan M. Santos-Gago; Will Ellis; Joris Klerkx
While many innovations in Technology Enhanced Learning TEL have emerged over the last two decades, the uptake of these innovations has not always been very successful, particularly in schools. The transition from proof of concept to integration into learning activities has been recognized as a bottleneck for quite some time. This major problem, which is affecting many TEL stakeholders, is the focus of the four year iTEC project that is developing a comprehensive approach.
Proceedings. Advances in Parallel and Distributed Computing | 1997
Jean-Noël Colin
In this paper, we present an original approach for the design and execution of distributed applications that require numerous tasks of variable grain. The approach is based on the concept of task cluster which is an entity that groups tasks with strong logical interaction and that guarantees efficient communications between them. We describe the implementation of the model, that mainly relies on the use of lightweight processes as support for the distributed tasks. We also illustrate the use of the proposed approach on real size applications where it has improved both the ease of design and the performance.